General
-
Target
fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3
-
Size
715KB
-
Sample
241111-c5nr9sznex
-
MD5
a3f1773ec835b4a940e1bb9a89f771ef
-
SHA1
d901e7e7416fd7140bd78fa47bcbf39010b35d0f
-
SHA256
fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3
-
SHA512
a0d9a6fcae78dcad3bbcd8c10e91a23b2c24e187a8f4602519645ab98e006c685b89a96fd3b6c7515b62673c23776bc9df99cce22064748820a55512c31c6f0c
-
SSDEEP
12288:1MrGy90fKtSVoYzDlx5QYjQcM0hWnkWlAQITvDMpJbtx7o3N2SyxnDbz7w5GDM9s:fyIKgVooDQb0QkqAQITvDMzbH092Pv4e
Static task
static1
Behavioral task
behavioral1
Sample
fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3
-
Size
715KB
-
MD5
a3f1773ec835b4a940e1bb9a89f771ef
-
SHA1
d901e7e7416fd7140bd78fa47bcbf39010b35d0f
-
SHA256
fc506c71dbf1b42f49b6d27f7e3192563ab2e36e163262fd83abd3c1b56de4b3
-
SHA512
a0d9a6fcae78dcad3bbcd8c10e91a23b2c24e187a8f4602519645ab98e006c685b89a96fd3b6c7515b62673c23776bc9df99cce22064748820a55512c31c6f0c
-
SSDEEP
12288:1MrGy90fKtSVoYzDlx5QYjQcM0hWnkWlAQITvDMpJbtx7o3N2SyxnDbz7w5GDM9s:fyIKgVooDQb0QkqAQITvDMzbH092Pv4e
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-